# decomposable_submodular_function_minimization_discrete_and_continuous__a7cd49b4.pdf Decomposable Submodular Function Minimization Discrete and Continuous Alina Ene Huy L. Nguy ên László A. Végh This paper investigates connections between discrete and continuous approaches for decomposable submodular function minimization. We provide improved running time estimates for the state-of-the-art continuous algorithms for the problem using combinatorial arguments. We also provide a systematic experimental comparison of the two types of methods, based on a clear distinction between level-0 and level-1 algorithms. 1 Introduction Submodular functions arise in a wide range of applications: graph theory, optimization, economics, game theory, to name a few. A function f : 2V R on a ground set V is submodular if f(X) + f(Y ) f(X Y ) + f(X Y ) for all sets X, Y V . Submodularity can also be interpreted as a diminishing returns property. There has been significant interest in submodular optimization in the machine learning and computer vision communities. The submodular function minimization (SFM) problem arises in problems in image segmentation or MAP inference tasks in Markov Random Fields. Landmark results in combinatorial optimization give polynomial-time exact algorithms for SFM. However, the highdegree polynomial dependence in the running time is prohibitive for large-scale problem instances. The main objective in this context is to develop fast and scalable SFM algorithms. Instead of minimizing arbitrary submodular functions, several recent papers aim to exploit special structural properties of submodular functions arising in practical applications. This paper focuses on the popular model of decomposable submodular functions. These are functions that can be written as sums of several simple submodular functions defined on small supports. Some definitions are needed to introduce our problem setting. Let f : 2V R be a submodular function, and let n := |V |. We can assume w.l.o.g. that f( ) = 0. We are interested in solving the submodular function minimization problem: min S V f(S). (SFM) For a vector y RV and a set S V , we use the notation y(S) := P v S y(v). The base polytope of a submodular function is defined as B(f) := {y RV : y(S) f(S) S V, y(V ) = f(V )}. One can optimize linear functions over B(f) using the greedy algorithm. The SFM problem can be reduced to finding the minimum norm point of the base polytope B(f) [10]. 2 y 2 2 : y B(f) . (Min-Norm) Department of Computer Science, Boston University, aene@bu.edu College of Computer and Information Science, Northeastern University, hu.nguyen@northeastern.edu Department of Mathematics, London School of Economics, L.Vegh@lse.ac.uk 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. This reduction is the starting point of convex optimization approaches for SFM. We refer the reader to Sections 44 45 in [28] for concepts and results in submodular optimization, and to [2] on machine learning applications. We assume that f is given in the decomposition f(S) = Pr i=1 fi(S), where each fi : 2V R is a submodular function. Such functions are called decomposable or Sum-of-Submodular (So S) in the literature. In the decomposable submodular function minimization (DSFM) problem, we aim to minimize a function given in such a decomposition. We will make the following assumptions. For each i [r], we assume that two oracles are provided: (i) a value oracle that returns fi(S) for any set S V in time EOi; and (ii) a quadratic minimization oracle Oi(w). For any input vector w Rn, this oracle returns an optimal solution to (Min-Norm) for the function fi + w, or equivalently, an optimal solution to miny B(fi) y + w 2 2. We let Θi denote the running time of a single call to the oracle Oi, Θmax := maxi [r] Θi denote the maximum time of an oracle call, Θavg := 1 i [r] Θi denote the average time of an oracle call.4 We let Fi,max := max S V |fi(S)|, Fmax := max S V |f(S)| denote the maximum function values. For each i [r], the function fi has an effective support Ci such that fi(S) = fi(S Ci) for every S V . DSFM thus requires algorithms on two levels. The level-0 algorithms are the subroutines used to evaluate the oracles Oi for every i [r]. The level-1 algorithm minimizes the function f using the level-0 algorithms as black boxes. 1.1 Prior work SFM has had a long history in combinatorial optimization since the early 1970s, following the influential work of Edmonds [4]. The first polynomial-time algorithm was obtained via the ellipsoid method [14]; recent work presented substantial improvements using this approach [22]. Substantial work focused on designing strongly polynomial combinatorial algorithms [9, 15, 16, 25, 17, 27]. Still, designing practical algorithms for SFM that can be applied to large-scale problem instances remains an open problem. Let us now turn to DSFM. Previous work mainly focused on level-1 algorithms. These can be classified as discrete and continuous optimization methods. The discrete approach builds on techniques of classical discrete algorithms for network flows and for submodular flows. Kolmogorov [21] showed that the problem can be reduced to submodular flow maximization, and also presented a more efficient augmenting path algorithm. Subsequent discrete approaches were given in [1, 7, 8]. Continuous approaches start with the convex programming formulation (Min-Norm). Gradient methods were applied for the decomposable setting in [5, 24, 30]. Less attention has been given to the level-0 algorithms. Some papers mainly focus on theoretical guarantees on the running time of level-1 algorithms, and treat the level-0 subroutines as black-boxes (e.g. [5, 24, 21]). In other papers (e.g. [18, 30]), the model is restricted to functions fi of a simple specific type that are easy to minimize. An alternative assumption is that all Ci s are small, of size at most k; and thus these oracles can be evaluated by exhaustive search, in 2k value oracle calls (e.g. [1, 7]). Shanu et al. [29] use a block coordinate descent method for level-1, and make no assumptions on the functions fi. The oracles are evaluated via the Fujishige-Wolfe minimum norm point algorithm [11, 31] for level-0. Let us note that these experimental studies considered the level-0 and level-1 algorithms as a single package . For example, Shanu et al. [29] compare the performance of their So S Min-Norm algorithm to the continuous approach of Jegelka et al. [18] and the combinatorial approach of Arora et al. [1]. However, these implementations cannot be directly compared, since they use three different level-0 algorithms: Fujishige-Wolfe in So S Min-Norm, a general QP solver for the algorithm of [18], and exhaustive search for [1]. For potentials of large support, Fujishige-Wolfe outperforms these other level-0 subroutines, hence the level-1 algorithms in [18, 1] could have compared more favorably using the same Fujishige-Wolfe subroutine. 4For flow-type algorithms for DSFM, a slightly weaker oracle assumption suffices, returning a minimizer of min S Ci fi(S) + w(S) for any given w RCi. This oracle and the quadratic minimization oracle are reducible to each other: the former reduces to a single call to the latter, and one can implement the latter using O(|Ci|) calls to the former (see e.g. [2]). 1.2 Our contributions Our paper establishes connections between discrete and continuous methods for DSFM, as well as provides a systematic experimental comparison of these approaches. Our main theoretical contribution improves the worst-case complexity bound of the most recent continuous optimization methods [5, 24] by a factor of r, the number of functions in the decomposition. This is achieved by improving the bounds on the relevant condition numbers. Our proof exploits ideas from the discrete optimization approach. This provides not only better, but also considerably simpler arguments than the algebraic proof in [24]. The guiding principle of our experimental work is the clean conceptual distinction between the level-0 and level-1 algorithms, and to compare different level-1 algorithms by using the same level-0 subroutines. We compare the state-of-the-art continuous and discrete algorithms: RCDM and ACDM from [5] with Submodular IBFS from [7]. We consider multiple options for the level-0 subroutines. For certain potential types, we use tailored subroutines exploiting the specific form of the problem. We also consider a variant of the Fujishige-Wolfe algorithm as a subroutine applicable for arbitrary potentials. Our experimental results reveal the following tradeoff. Discrete algorithms on level-1 require more calls to the level-0 oracle, but less overhead computation. Hence using algorithms such as IBFS on level-1 can be significantly faster than gradient descent, as long as the potentials have fairly small supports. However, as the size of the potentials grow, or we do need to work with a generic level-0 algorithm, gradient methods are preferable. Gradient methods can perform better for larger potentials also due to weaker requirements on the level-0 subroutines: approximate level-0 subroutines suffice for them, whereas discrete algorithms require exact optimal solutions on level-0. Paper outline. The rest of the paper is structured as follows. The level-1 algorithmic frameworks using discrete and convex optimization are described in Sections 2 and 3, respectively. Section 4 gives improved convergence guarantees for the gradient descent algorithms outlined in Section 3. Section 5 discusses the different types of level-0 algorithms and how they can be used together with the level-1 frameworks. Section 6 presents a brief overview of our experimental results. This is an extended abstract. The full paper is available on http://arxiv.org/abs/1703.01830. 2 Discrete optimization algorithms on Level-1 In this section, we outline a level-1 algorithmic framework for DSFM that is based on a combinatorial framework first studied by Fujishige and Zhang [12] for submodular intersection. The submodular intersection problem is equivalent to DSFM for the sum of two functions, and the approach can be adapted and extended to the general DSFM problem with an arbitrary decomposition. We now give a brief description of the algorithmic framework. The full version exhibits submodular versions of the Edmonds-Karp and preflow-push algorithms. Algorithmic framework. For a decomposable function f, every x B(f) can be written as x = Pr i=1 xi, where supp(xi) Ci and xi B(fi) (see e.g. Theorem 44.6 in [28]). A natural algorithmic approach is to maintain an x B(f) in such a representation, and iteratively update it using the combinatorial framework described below. DSFM can be cast as a maximum network flow problem in a network that is suitably defined based on the current point x. This can be viewed as an analogue of the residual graph in the maxflow/mincut setting, and it is precisely the residual graph if the DSFM instance is a minimum cut instance. The auxiliary graph. For an x B(f) of the form x = Pr i=1 xi, we construct the following directed auxiliary graph G = (V, E), with E = Sr i=1 Ei and capacities c : E R+. E is a multiset union: we include parallel copies if the same arc occurs in multiple Ei. The arc sets Ei are complete directed graphs (cliques) on Ci, and for an arc (u, v) Ei, we define c(u, v) := min{fi(S) xi(S): S Ci, u S, v / S}. This is the maximum value ε such that x i B(fi), where x i(u) = xi(u) + ε, x i(v) = xi(v) ε, x i(z) = xi(z) for z / {u, v}. Let N := {v V : x(v) < 0} and P := {v V : x(v) > 0}. The algorithm aims to improve the current x by updating along shortest directed paths from N to P with positive capacity; there are several ways to update the solution, and we discuss specific approaches (derived from maximum flow algorithms) in the full version. If there exists no such directed path, then we let S denote the set reachable from N on directed paths with positive capacity; thus, S P = . One can show that S is a minimizer of the function f. Updating along a shortest path Q from N to P amounts to the following. Let ε denote the minimum capacity of an arc on Q. If (u, v) Q Ei, then we increase xi(u) by ε and decrease xi(v) by ε. The crucial technical claim is the following. Let d(u) denote the shortest path distance of positive capacity arcs from u to the set P. Then, an update along a shortest directed path from N to P results in a feasible x B(f), and further, all distance labels d(u) are non-decreasing. We refer the reader to Fujishige and Zhang [12] for a proof of this claim. Level-1 algorithms based on the network flow approach. Using the auxiliary graph described above, and updating on shortest augmenting paths, one can generalize several maximum flow algorithms to a level-1 algorithm of DSFM. In particular, based on the preflow-push algorithm [13], one can obtain a strongly polynomial DSFM algorithm with running time O(n2Θmax Pr i=1 |Ci|2). A scaling variant provides a weakly polynomial running time O(n2Θmax log Fmax + n Pr i=1 |Ci|3Θi). We defer the details to the full version of the paper. In our experiments, we use the submodular IBFS algorithm [7] as the main discrete level-1 algorithm; the same running time estimate as for preflow-push is applicable. If all Ci s are small, O(1), the running time is O(n2rΘmax); note that r = Ω(n) in this case. 3 Convex optimization algorithms on Level-1 3.1 Convex formulations for DSFM Recall the convex quadratic program (Min-Norm) from the Introduction. This program has a unique optimal solution s , and the set S = {v V : s (v) < 0} is the unique smallest minimizer to the SFM problem. We will refer to this optimal solution s throughout the section. In the DSFM setting, one can write (Min-Norm) in multiple equivalent forms [18]. For the first formulation, we let P := Qr i=1 B(fi) Rrn, and let A Rn (rn) denote the following matrix: A := [In In . . . In] | {z } r times Note that, for every y P, Ay = Pr i=1 yi, where yi is the i-th block of y, and thus Ay B(f). The problem (Min-Norm) can be reformulated for DSFM as follows. 2 Ay 2 2 : y P . (Prox-DSFM) The second formulation is the following. Let us define the subspace A := {a Rnr : Aa = 0}, and minimize its distance from P: min a y 2 2 : a A, y P . (Best-Approx) The set of optimal solutions for both formulations (Prox-DSFM) and (Best-Approx) is the set E := {y P : Ay = s }, where s is the optimum of (Min-Norm). We note that, even though the set of solutions to (Best-Approx) are pairs of points (a, y) A P, the optimal solutions are uniquely determined by y P, since the corresponding a is the projection of y to A. 3.2 Level-1 algorithms based on gradient descent The gradient descent algorithms of [24, 5] provide level-1 algorithms for DSFM. We provide a brief overview of these algorithms and we refer the reader to the respective papers for more details. The alternating projections algorithm. Nishihara et al. [24] minimize (Best-Approx) using alternating projections. The algorithm starts with a point a0 A and it iteratively constructs a sequence (a(k), x(k)) k 0 by projecting onto A and P: x(k) = argminx P a(k) x 2, a(k+1) = argmina A a x(k) 2. Random coordinate descent algorithms. Ene and Nguyen [5] minimize (Prox-DSFM) using random coordinate descent. The RCDM algorithm adapts the random coordinate descent algorithm of Nesterov [23] to (Prox-DSFM). In each iteration, the algorithm samples a block i [r] uniformly at random and it updates xi via a standard gradient descent step for smooth functions. ACDM, the accelerated version of the algorithm, presents a further enhancement using techniques from [6]. 3.3 Rates of convergence and condition numbers The algorithms mentioned above enjoy a linear convergence rate despite the fact that the objective functions of (Best-Approx) and (Prox-DSFM) are not strongly convex. Instead, the works [24, 5] show that there are certain parameters that one can associate with the objective functions such that the convergence is at the rate (1 α)k, where α (0, 1) is a quantity that depends on the appropriate parameter. Let us now define these parameters. Let A be the affine subspace A := {a Rnr : Aa = s }. Note that the set E of optimal solutions to (Prox-DSFM) and (Best-Approx) is E = P A . For y Rnr and a closed set K Rnr, we let d(y, K) = min { y z 2 : z K} denote the distance between y and K. The relevant parameter for the Alternating Projections algorithm is defined as follows. Definition 3.1 ([24]). For every y (P A ) \ E, let κ(y) := d(y, E) max {d(y, P), d(y, A )}, and κ := sup {κ(y): y (P A ) \ E} . The relevant parameter for the random coordinate descent algorithms is the following. Definition 3.2 ([5]). For every y P, let y := argminp{ p y 2 : p E} be the optimal solution to (Prox-DSFM) that is closest to y. We say that the objective function 1 2 Ay 2 2 of (Prox-DSFM) is restricted ℓ-strongly convex if, for all y P, we have A(y y ) 2 2 ℓ y y 2 2. ℓ := sup ℓ: 1 2 Ay 2 2 is restricted ℓ-strongly convex . The running time dependence of the algorithms on these parameters is given in the following theorems. Theorem 3.3 ([24]). Let (a(0), x(0) = argminx P a(0) x 2) be the initial solution and let (a , x ) be an optimal solution to (Best-Approx). The alternating projection algorithm produces in k = Θ κ2 ln x(0) x 2 iterations a pair of points a(k) A and x(k) P that is ϵ-optimal, i.e., a(k) x(k) 2 2 a x 2 2 + ε. Theorem 3.4 ([5]). Let x(0) P be the initial solution and let x be an optimal solution to (Prox-DSFM) that minimizes x(0) x 2. The random coordinate descent algorithm produces in ℓ ln x(0) x 2 iterations a solution x(k) that is ϵ-optimal in expectation, i.e., E 1 2 Ax(k) 2 2 1 2 Ax 2 2 + ϵ. The accelerated coordinate descent algorithm produces in 1 ℓ ln x(0) x 2 iterations (specifically, Θ ln x(0) x 2 ϵ epochs with Θ r q iterations in each epoch) a solution x(k) that is ϵ-optimal in expectation, i.e., E 1 2 Ax(k) 2 2 1 2 Ax 2 2 + ϵ. 3.4 Tight analysis for the condition numbers and running times We provide a tight analysis for the condition numbers (the parameters κ and ℓ defined above). This leads to improved upper bounds on the running times of the gradient descent algorithms. Theorem 3.5. Let κ and ℓ be the parameters defined in Definition 3.1 and Definition 3.2. We have κ = Θ(n r) and ℓ = Θ(1/n2). Using our improved convergence guarantees, we obtain the following improved running time analyses. Corollary 3.6. The total running time for obtaining an ϵ-approximate solution5 is as follows. Alternating projections (AP): O n2r2Θavg ln x(0) x 2 Random coordinate descent (RCDM): O n2rΘavg ln x(0) x 2 Accelerated random coordinate descent (ACDM): O nrΘavg ln x(0) x 2 We can upper bound the diameter of the base polytope by O( n Fmax) [19], and thus x(0) x 2 = O( n Fmax). For integer-valued functions, a ε-approximate solution can be converted to an exact optimum if ε = O(1/n) [2]. The upper bound on κ and the lower bound on ℓ are shown in Theorem 4.2. The lower bound on κ and upper bound on ℓ in Theorem 3.5 follow by constructions in previous work, as explained next. Nishihara et al. showed that κ nr, and they give a family of minimum cut instances for which κ = Ω(n r). Namely, consider a graph with n vertices and m edges, and suppose for simplicity that the edges have integer capacities at most C. The cut function of the graph can be decomposed into functions corresponding to the individual edges, and thus r = m and Θavg = O(1). Already on simple cycle graphs, they show that the running time of AP is Ω(n2m2 ln(n C)), which implies κ = Ω(n r). Using the same construction, it is easy to obtain the upper bound ℓ = O(1/n2). 4 Tight convergence bounds for the convex optimization algorithms In this section, we show that the combinatorial approach introduced in Section 2 can be applied to obtain better bounds on the parameters κ and ℓ defined in Section 3. Besides giving a stronger bound, our proof is considerably simpler than the algebraic one using Cheeger s inequality in [24]. The key is the following lemma. Lemma 4.1. Let y P and s B(f). Then there exists a point x P such that Ax = s and x y 2 n Before proving this lemma, we show how it can be used to derive the bounds. Theorem 4.2. We have κ n r/2 + 1 and ℓ 4/n2. Proof: We start with the bound on κ . In order to bound κ , we need to upper bound κ(y) for any y (P A ) \ E. We distinguish between two cases: y P \ E and y A \ E. Case I: y P \E. The denominator in the definition of κ(y) is equal to d(y, A ) = Ay s 2/ r. This follows since the closest point a = (a1, . . . , ar) to y in A can be obtained as ai = yi + (s Ay)/r for each i [r]. Lemma 4.1 gives an x P such that Ax = s and x y 2 n 2 Ay s 2. Since Ax = s , we have x E and thus the numerator of κ(y) is at most x y 2. Thus κ(y) x y 2/( Ay s 2/ r) n r/2. Case II: y A \ E. This means that Ay = s . The denominator of κ(y) is equal to d(y, P). For each i [r], let qi B(fi) be the point that minimizes yi qi 2. Let q = (q1, . . . , qr) P. Then 5The algorithms considered here solve the optimization problem (Prox-DSFM). An ε-approximate solution to an optimization problem min{f(x): x P} is a solution x P satisfying f(x) f(x ) + ε, where x argminx P f(x) is an optimal solution. d(y, P) = y q 2. Lemma 4.1 with q in place of y gives a point x E such that q x 2 n 2 Aq s 1. We have Aq s 1 = Aq Ay 1 Pr i=1 qi yi 1 = q y 1 nr q y 2. Thus q x 2 n r 2 q y 2. Since x E, we have d(y, E) x y 2 x q 2 + q y 2 1 + n r 2 q y 2 = 1 + n r 2 d(y, P). Therefore κ(p) 1 + n r 2 , as desired. Let us now prove the bound on ℓ . Let y P and let y := argminp{ p y 2 : y E}. We need to verify that A(y y ) 2 2 4 n2 y y 2 2. Again, we apply Lemma 4.1 to obtain a point x P such that Ax = s and x y 2 2 n 4 Ax Ay 2 1 n2 4 Ax Ay 2 2. Since Ax = s , the definition of y gives y y 2 2 x y 2 2. Using that Ax = Ay = s , we have Ax Ay 2 = Ay Ay 2. Proof of Lemma 4.1: We give an algorithm that transforms y to a vector x P as in the statement through a sequence of path augmentations in the auxiliary graph defined in Section 2. We initialize x = y and maintain x P (and thus Ax B(f)) throughout. We now define the set of source and sink nodes as N := {v V : (Ax)(v) < s (v)} and P := {v V : (Ax)(v) > s (v)}. Once N = P = , we have Ax = s and terminate. Note that since Ax, s B(f), we have P v(Ax)(v) = P v s (v) = f(V ), and therefore N = is equivalent to P = . The blocks of x are denoted as x = (x1, x2, . . . , xr), with xi B(fi). Claim 4.3. If N = , then there exists a directed path of positive capacity in the auxiliary graph between the sets N and P. Proof: We say that a set T is i-tight, if xi(T) = fi(T). It is a simple consequence of submodularity that the intersection and union of two i-tight sets are also i-tight sets. For every i [r] and every u V , we define Ti(u) as the unique minimal i-tight set containing u. It is easy to see that for an arc (u, v) Ei, c(u, v) > 0 if and only if v Ti(u). We note that if u / Ci, then x(u) = fi({u}) = 0 and thus Ti(u) = {u}. Let S be the set of vertices reachable from N on a directed path of positive capacity in the auxiliary graph. For a contradiction, assume S P = . By the definition of S, we must have Ti(u) S for every u S and every i [r]. Since the union of i-tight sets is also i-tight, we see that S is i-tight for every i [r], and consequently, x(S) = f(S). On the other hand, since N S, S P = , and N = , we have x(S) < s (S). Since s B(f), we have f(S) = x(S) < s (S) f(S), a contradiction. We conclude that S P = . In every step of the algorithm, we take a shortest directed path Q of positive capacity from N to P, and update x along this path. That is, if (u, v) Q Ei, then we increase xi(u) by ε and decrease xi(v) by ε, where ε is the minimum capacity of an arc on Q. Note that this is the same as running the Edmonds-Karp-Dinitz algorithm in the submodular auxiliary graph. Using the analysis of [12], one can show that this change maintains x P, and that the algorithm terminates in finite (in fact, strongly polynomial) time. We defer the details to the full version of the paper. It remains to bound x y 2. At every path update, the change in ℓ -norm of x is at most ε, and the change in ℓ1-norm is at most nε, since the length of the path is n. At the same time, P v N(s (v) (Ax)(v)) decreases by ε. Thus, x y Ay s 1/2 and x y 1 n Ay s 1/2. Using the inequality p 2 p p 1 p , we obtain x y 2 n 2 Ay s 1, completing the proof. 5 The level-0 algorithms In this section, we briefly discuss the level-0 algorithms and the interface between the level-1 and level-0 algorithms. Two-level frameworks via quadratic minimization oracles. Recall from the Introduction the assumption on the subroutines Oi(w) that finds the minimum norm point in B(fi + w) for the input vector w Rn for each i [r]. The continuous methods in Section 3 directly use the subroutines Oi(w) for the alternating projection or coordinate descent steps. For the flow-based algorithms in Section 2, the main oracle query is to find the auxiliary graph capacity c(u, v) of an arc (u, v) Ei for some i [r]. This can be easily formulated as minimizing the function fi+w for an appropriate w with supp(w) Ci. As explained at the beginning of Section 3, an optimal solution to (Min-Norm) immediately gives an optimal solution to the SFM problem for the same submodular function. Hence, the auxiliary graph capacity queries can be implemented via single calls to the subroutines Oi(w). Let us also remark that, while the functions fi are formally defined on the entire ground set V , their effective support is Ci, and thus it suffices to solve the quadratic minimization problems on the ground set Ci. Whereas discrete and continuous algorithms require the same type of oracles, there is an important difference between the two algorithms in terms of exactness for the oracle solutions. The discrete algorithms require exact values of the auxiliary graph capacities c(u, v), as they must maintain xi B(fi) throughout. Thus, the oracle must always return an optimal solution. The continuous algorithms are more robust, and return a solution with the required accuracy even if the oracle only returns an approximate solution. As discussed in Section 6, this difference leads to the continuous methods being applicable in settings where the combinatorial algorithms are prohibitively slow. Level-0 algorithms. We now discuss specific algorithms for quadratic minimization over the base polytopes of the functions fi. Several functions that arise in applications are simple , meaning that there is a function-specific quadratic minimization subroutine that is very efficient. If a functionspecific subroutine is not available, one can use a general-purpose submodular minimization algorithm. The works [1, 7] use a brute force search as the subroutine for each each fi, whose running time is 2|Ci|EOi. However, this is applicable only for small Ci s and is not suitable for our experiments where the maximum clique size is quite large. As a general-purpose algorithm, we used the Fujishige-Wolfe minimum norm point algorithm [11, 31]. This provides an ε-approximate solution in O(|Ci|F 2 i,max/ε) iterations, with overall running time bound O((|Ci|4 + |Ci|2EOi)F 2 i,max/ε) [3]. The experimental running time of the Fujishige-Wolfe algorithm can be prohibitively large [20]. As we discuss in Section 6, by warm-starting the algorithm and performing only a small number of iterations, we were able to use the algorithm in conjunction with the gradient descent level-1 algorithms. 6 Experimental results We evaluate the algorithms on energy minimization problems that arise in image segmentation problems. We follow the standard approach and model the image segmentation task of segmenting an object from the background as finding a minimum cost 0/1 labeling of the pixels. The total labeling cost is the sum of labeling costs corresponding to cliques, where a clique is a set of pixels. We refer to the labeling cost functions as clique potentials. The main focus of our experimental analysis is to compare the running times of the decomposable submodular minimization algorithms. Therefore we have chosen to use the simple hand-tuned potentials that were used in previous work: the edge-based costs [1] and the count-based costs defined by [29, 30]. Specifically, we used the following clique potentials in our experiments, all of which are submodular: Unary potentials for each pixel. The unary potentials are derived from Gaussian Mixture Models of color features [26]. Pairwise potentials for each edge of the 8-neighbor grid graph. For each graph edge (i, j) between pixels i and j, the cost of a labeling equals 0 if the two pixels have the same label, and exp( vi vj 2) for different labels, where vi is the RGB color vector of pixel i. Square potentials for each 2 2 square of pixels. The cost of a labeling is the square root of the number of neighboring pixels that have different labels, as in [1]. Region potentials. We use the algorithm from [30] to identify regions. For each region Ci, the labeling cost is fi(S) = |S||Ci \ S|, where S and Ci \ S are the subsets of Ci labeled 0 and 1, respectively, see [29, 30]. We used five image segmentation instances to evaluate the algorithms.6 The experiments were carried out on a single computer with a 3.3 GHz Intel Core i5 processor and 8 GB of memory; we reported averaged times over 10 trials. We performed several experiments with various combinations of potentials and parameters. In the minimum cut experiments, we evaluated the algorithms on instances containing only unary and 6The data is available at http://melodi.ee.washington.edu/~jegelka/cc/index.html and http://research.microsoft.com/en-us/um/cambridge/projects/visionimagevideoediting/ segmentation/grabcut.htm 0 200 400 600 800 1000 #iterations / #functions Running Time plant (all experiments) IBFS (mincut) IBFS (small cliques) IBFS (large cliques) RCDM (mincut) RCDM (small cliques) RCDM (large cliques) ACDM (mincut) ACDM (small cliques) ACDM (large cliques) 0 200 400 600 800 1000 #iterations / #functions Running Time octopus (all experiments) IBFS (mincut) IBFS (small cliques) IBFS (large cliques) RCDM (mincut) RCDM (small cliques) RCDM (large cliques) ACDM (mincut) ACDM (small cliques) ACDM (large cliques) 0 200 400 600 800 1000 #iterations / #functions Running Time penguin (all experiments) IBFS (mincut) IBFS (small cliques) IBFS (large cliques) RCDM (mincut) RCDM (small cliques) RCDM (large cliques) ACDM (mincut) ACDM (small cliques) ACDM (large cliques) 0 200 400 600 800 1000 #iterations / #functions Running Time plant (large cliques with Fujishige-Wolfe) Figure 1: Running times in seconds on a subset of the instances. The results for the other instances are very similar and are deferred to the full version of the paper. The x-axis shows the number of iterations for the continuous algorithms. The IBFS algorithm is exact, and we display its running time as a flat line. In the first three plots, the running time of IBFS on the small cliques instances nearly coincides with its running time on minimum cut instances. In the last plot, the running time of IBFS is missing since it is computationally prohibitive to run it on those instances. pairwise potentials; in the small cliques experiments, we used unary, pairwise, and square potentials. Finally, the large cliques experiments used all potentials above. Here, we used two different level-0 algorithms for the region potentials. Firstly, we used an algorithm specific to the particular potential, with running time O(|Ci| log(|Ci|) + |Ci|EOi). Secondly, we used the general Fujishige-Wolfe algorithm for level-0. This turned out to be significantly slower: it was prohibitive to run the algorithm to near-convergence. Hence, we could not implement IBFS in this setting as it requires an exact solution. We were able to implement coordinate descent methods with the following modification of Fujishige Wolfe at level-0. At every iteration, we ran Fujishige-Wolfe for 10 iterations only, but we warm-started with the current solution xi B(fi) for each i [r]. Interestingly, this turned out to be sufficient for the level-1 algorithm to make progress. Summary of results. Figure 1 shows the running times for some of the instances; we defer the full experimental results to the full version of the paper. The IBFS algorithm is significantly faster than the gradient descent algorithms on all of the instances with small cliques. For all of the instances with larger cliques, IBFS (as well as other combinatorial algorithms) are no longer suitable if the only choice for the level-0 algorithms are generic methods such as the Fujishige-Wolfe algorithm. The experimental results suggest that in such cases, the coordinate descent methods together with a suitably modified Fujishige-Wolfe algorithm provides an approach for obtaining an approximate solution. [1] C. Arora, S. Banerjee, P. Kalra, and S. Maheshwari. Generic cuts: An efficient algorithm for optimal inference in higher order MRF-MAP. In European Conference on Computer Vision, pages 17 30. Springer, 2012. [2] F. Bach. Learning with submodular functions: A convex optimization perspective. Foundations and Trends in Machine Learning, 6(2-3):145 373, 2013. [3] D. Chakrabarty, P. Jain, and P. Kothari. Provable submodular minimization using Wolfe s algorithm. In Advances in Neural Information Processing Systems, pages 802 809, 2014. [4] J. Edmonds. Submodular functions, matroids, and certain polyhedra. Combinatorial structures and their applications, pages 69 87, 1970. [5] A. R. Ene and H. L. Nguyen. Random coordinate descent methods for minimizing decomposable submodular functions. In Proceedings of the 32nd International Conference on Machine Learning (ICML), 2015. [6] O. Fercoq and P. Richtárik. Accelerated, parallel, and proximal coordinate descent. SIAM Journal on Optimization, 25(4):1997 2023, 2015. [7] A. Fix, T. Joachims, S. Min Park, and R. Zabih. Structured learning of sum-of-submodular higher order energy functions. In Proceedings of the IEEE International Conference on Computer Vision, pages 3104 3111, 2013. [8] A. Fix, C. Wang, and R. Zabih. A primal-dual algorithm for higher-order multilabel Markov random fields. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1138 1145, 2014. [9] L. Fleischer and S. Iwata. A push-relabel framework for submodular function minimization and applications to parametric optimization. Discrete Applied Mathematics, 131(2):311 322, 2003. [10] S. Fujishige. Lexicographically optimal base of a polymatroid with respect to a weight vector. Mathematics of Operations Research, 5(2):186 196, 1980. [11] S. Fujishige and S. Isotani. A submodular function minimization algorithm based on the minimum-norm base. Pacific Journal of Optimization, 7(1):3 17, 2011. [12] S. Fujishige and X. Zhang. New algorithms for the intersection problem of submodular systems. Japan Journal of Industrial and Applied Mathematics, 9(3):369, 1992. [13] A. V. Goldberg and R. E. Tarjan. A new approach to the maximum-flow problem. Journal of the ACM (JACM), 35(4):921 940, 1988. [14] M. Grötschel, L. Lovász, and A. Schrijver. The ellipsoid method and its consequences in combinatorial optimization. Combinatorica, 1(2):169 197, 1981. [15] S. Iwata. A faster scaling algorithm for minimizing submodular functions. SIAM Journal on Computing, 32(4):833 840, 2003. [16] S. Iwata, L. Fleischer, and S. Fujishige. A combinatorial strongly polynomial algorithm for minimizing submodular functions. Journal of the ACM (JACM), 48(4):761 777, 2001. [17] S. Iwata and J. B. Orlin. A simple combinatorial algorithm for submodular function minimization. In ACM-SIAM Symposium on Discrete Algorithms (SODA), 2009. [18] S. Jegelka, F. Bach, and S. Sra. Reflection methods for user-friendly submodular optimization. In Advances in Neural Information Processing Systems (NIPS), 2013. [19] S. Jegelka and J. A. Bilmes. Online submodular minimization for combinatorial structures. In Proceedings of the 28th International Conference on Machine Learning (ICML-11), pages 345 352, 2011. [20] S. Jegelka, H. Lin, and J. A. Bilmes. On fast approximate submodular minimization. In Advances in Neural Information Processing Systems, pages 460 468, 2011. [21] V. Kolmogorov. Minimizing a sum of submodular functions. Discrete Applied Mathematics, 160(15):2246 2258, 2012. [22] Y. T. Lee, A. Sidford, and S. C.-w. Wong. A faster cutting plane method and its implications for combinatorial and convex optimization. In IEEE Foundations of Computer Science (FOCS), 2015. [23] Y. Nesterov. Efficiency of coordinate descent methods on huge-scale optimization problems. SIAM Journal on Optimization, 22(2):341 362, 2012. [24] R. Nishihara, S. Jegelka, and M. I. Jordan. On the convergence rate of decomposable submodular function minimization. In Advances in Neural Information Processing Systems (NIPS), pages 640 648, 2014. [25] J. B. Orlin. A faster strongly polynomial time algorithm for submodular function minimization. Mathematical Programming, 118(2):237 251, 2009. [26] C. Rother, V. Kolmogorov, and A. Blake. Grabcut: Interactive foreground extraction using iterated graph cuts. ACM Transactions on Graphics (TOG), 23(3):309 314, 2004. [27] A. Schrijver. A combinatorial algorithm minimizing submodular functions in strongly polynomial time. Journal of Combinatorial Theory, Series B, 80(2):346 355, 2000. [28] A. Schrijver. Combinatorial optimization - Polyhedra and Efficiency. Springer, 2003. [29] I. Shanu, C. Arora, and P. Singla. Min norm point algorithm for higher order MRF-MAP inference. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5365 5374, 2016. [30] P. Stobbe and A. Krause. Efficient minimization of decomposable submodular functions. In Advances in Neural Information Processing Systems (NIPS), 2010. [31] P. Wolfe. Finding the nearest point in a polytope. Mathematical Programming, 11(1):128 149, 1976.